Your submission was sent successfully! Close

CVE-2015-4103

Published: 03 June 2015

Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.

Priority

Medium

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.0.0+dfsg-2ubuntu1.13)
Patches:
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=5c83b2f5b4b956e91dd6e5711f14df7ab800aefb
qemu-kvm
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

xen
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [4.4.2-0ubuntu0.14.04.2])
Patches:
Upstream: http://xenbits.xen.org/xsa/xsa128-qemut.patch
Upstream: http://xenbits.xen.org/xsa/xsa128-qemuu-4.3.patch
Upstream: http://xenbits.xen.org/xsa/xsa128-qemuu.patch
Binaries built from this source package are in Universe and so are supported by the community.